How does an attacker use a zero-day vulnerability during the Incursion phase?

How does an attacker use a zero-day vulnerability during the Incursion phase?
A . To perform a SQL injection on an internal server
B . To extract sensitive information from the target
C . To perform network discovery on the target
D . To deliver malicious code that breaches the target

Answer: D

Explanation:

Reference: https://www.symantec.com/connect/blogs/guide-zero-day-exploits

Latest 250-441 Dumps Valid Version with 70 Q&As

Latest And Valid Q&A | Instant Download | Once Fail, Full Refund

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments